Agenda

Date and TimeTitle
Apr 6, 2023
8:00am - 8:05am (Eastern)
Opening Introductions
Apr 6, 2023
8:00am - 9:15am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
9:15am - 10:00am (Eastern)
ManageEngine | Role of IAM and Log forensics in thwarting insider threats
Cloud adoption boosts digital transformation for organizations embarking on a modernization program – the main reason organizations often opt for a hybrid active directory (AD) approach.
 
However, the other side of the coin to consider with the hybrid AD approach is that your network perimeters disappear. This is a critical factor leading to an increase in the number of threat incidents, especially insider threats.
 
To address this new challenge, organizations must build a unified security strategy with hybrid identity management and forensics at the center.
 
Join this session to learn:
1. What the new network perimeter looks like in a cloud environment
2. How organizations can balance application and data workload with hybrid AD
3. Why it is critical to close the security gap in the cloud
4. The role of IAM and Log forensics in mitigating insider threats
Apr 6, 2023
10:00am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
10:30am - 11:00am (Eastern)
Vectra | We don’t know where we are compromised right now

When 7 out of 10 security leaders admit – “WE DON’T KNOW WHERE WE ARE COMPROMISED RIGHT NOW” – we have a problem – specifically a signal problem.

Apr 6, 2023
10:50am - 11:30am (Eastern)
Bitdefender | Top 5 Ransomware Myths

The world’s largest taxi company doesn’t own any cars. The world’s largest accommodation company doesn’t own any property. And some of the largest ransomware groups are not deploying ransomware. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings. And the idea that we understand how ransomware works is one of the reasons why it is continuously on the rise. Join this session to learn about the latest innovations and business ideas that are shaping the world of cybercrime, and some of the ways how we can turn the modern ransomware ecosystem against itself.

Apr 6, 2023
11:30am - 11:53am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
11:53am - 12:15pm (Eastern)
Reciprocity | See risk differently! Surface unseen risk to get ahead of threats!

Many organizations believe that by complying with cybersecurity and compliance regulations, they are safe from attacks and data breaches. No organization is safe. And, being compliant doesn’t mean that you are sufficiently protected.  Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments.  And they’re usually a few steps ahead of you.

How can you reduce complexity and gain better insight into the risk of your strategic business priorities without burdening already taxed InfoSec teams?  You need to see risk differently by taking a different approach!

Join this session and learn how to:

  • Gain insight into your risk posture and how risk impacts your business priorities

  • Surface unseen risks lurking in the silos, disconnects, and gaps of your InfoSec activities

  • Use intelligence and automation to deliver quick wins while freeing  up your team’s’ time

Apr 6, 2023
12:15pm - 12:35pm (Eastern)
Flare | Tokenizing the Dark Web : Applying NLP in the context of Cyber Threat Intelligence

Training a model using Natural Language Processing (NLP) is challenging. Training one adapted to the unique vocabulary of malicious actors becomes even more difficult. This complex process highlights the need of having a continuously adaptive lexical able to follow new trends in illicit communities.
To overcome the challenge of the distinct vocabulary used by malicious actors, we’ve created and made public the first open-source tokenizer trained on a corpus containing years of content from interactions on the Dark Web. The tokenizer and lexical are in the format of Byte-Pair-Encoding and will be available on GitHub.
We will demonstrate two applications of this model, applied to real world challenges and highlight some insights found by them. First, we will demonstrate how the ML auto-extractor is able to extract contents from a wide variety of illicit forums, without human configuration.  Then, we will show how we were able to regroup multiple actors’ monikers based on their writing style.
What you would learn during this talk:
How to avoid the pitfalls when training NLP on slang/jargon.
How to continuously adapt the lexical to follow new trends in illicit communities.
With the release of this open-source model, malware researchers and threat hunters will be able to automate interactions with cybercriminals, support infiltration engagements, and analyze communications and data leaks. Additionally, by constantly updating the lexical based on cybercriminals’ interactions, the model allows researchers to discover and track rising trends.

Apr 6, 2023
12:35pm - 1:10pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
1:10pm - 1:40pm (Eastern)
Cloudflare | The (hard) key to stop phishing: How Cloudflare stopped a targeted attack and you can too

In July 2022, Cloudflare was targeted in a sophisticated SMS phishing scheme in such a way that we believe most organizations would be likely to be breached. In this session we’ll detail the recent targeted phishing attack we saw at Cloudflare and more importantly, how we stopped it and steps you can take to protect your organization as well. We’ll cover topics like: why not all MFA is created equally, the role of Zero trust network access in rolling out strong authentication, and the importance of a blame-free culture around security.

Apr 6, 2023
1:40pm - 2:08pm (Eastern)
Exabeam | How to Build an Insider Threat Program

Sometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.

Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything  changes so quickly. Insider threat initiatives require a new, more focused approach.

This presentation will explore:

  • The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
  • Four attributes of a successful insider threat program
  • How behavioral analytics baseline “normal” behavior of users and devices – showing risk faster
  • An automated investigation experience that replaces manual routines and effectively guides new insider threat teams
Apr 6, 2023
2:05pm - 2:20pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
2:20pm - 3:20pm (Eastern)
Panel | Cybersecurity Leaders and Experts on Current Cyberthreats and Practices
Apr 6, 2023
3:15pm - 3:35pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Apr 6, 2023
3:40pm - 3:55pm (Eastern)
Closing Remarks